首页 > 最新文献

2016 IEEE International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
Digital flight plans for server access control: Restricting anomalous activity with path-based declarations of intentions 用于服务器访问控制的数字飞行计划:使用基于路径的意图声明限制异常活动
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815705
R. Loui, Lucinda Caughey
In response to increasing threats of malicious activity and data loss on servers, we propose a different and practical strategy for access control modeled after flight plans for pilots, which mixes existing role-based, object-based, and intention-based access models; it supports much finer grained, real-time, sequence-oriented anomaly detection. Users are required to declare their intended “flight path” in advance, a sketch of resource use: this may vary in detail, but could include database tables, file system directories, byte and bandwidth limits, use of encryption and archive creation, command sets, connection time, number and origin of connections, and ports. Sequence information provides especially strong constraint, even if it incomplete. We find an important place for active, on-line human sampling of flight plans, as well as pre-authorization for non-standard paths, and alerts for deviation from path. We also find a place for improved user profiling and a paradigm shift from ex-post log-based reconstruction of user activity to ex-ante declaration.
为了应对服务器上日益增长的恶意活动和数据丢失威胁,我们提出了一种不同的、实用的访问控制策略,该策略以飞行员的飞行计划为模型,混合了现有的基于角色、基于对象和基于意图的访问模型;它支持更细粒度、实时、面向序列的异常检测。用户需要提前声明他们预期的“飞行路径”,资源使用的草图:这可能在细节上有所不同,但可能包括数据库表、文件系统目录、字节和带宽限制、加密和存档创建的使用、命令集、连接时间、连接的数量和来源以及端口。序列信息提供了特别强的约束,即使它是不完整的。我们发现对飞行计划进行主动的在线人工采样,对非标准路径进行预授权,以及对偏离路径进行警报是一个重要的地方。我们还发现了改进用户分析和从事后基于日志的用户活动重建到事前声明的范式转变的地方。
{"title":"Digital flight plans for server access control: Restricting anomalous activity with path-based declarations of intentions","authors":"R. Loui, Lucinda Caughey","doi":"10.1109/CCST.2016.7815705","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815705","url":null,"abstract":"In response to increasing threats of malicious activity and data loss on servers, we propose a different and practical strategy for access control modeled after flight plans for pilots, which mixes existing role-based, object-based, and intention-based access models; it supports much finer grained, real-time, sequence-oriented anomaly detection. Users are required to declare their intended “flight path” in advance, a sketch of resource use: this may vary in detail, but could include database tables, file system directories, byte and bandwidth limits, use of encryption and archive creation, command sets, connection time, number and origin of connections, and ports. Sequence information provides especially strong constraint, even if it incomplete. We find an important place for active, on-line human sampling of flight plans, as well as pre-authorization for non-standard paths, and alerts for deviation from path. We also find a place for improved user profiling and a paradigm shift from ex-post log-based reconstruction of user activity to ex-ante declaration.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"15 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84189438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Prom Problem: Fair and privacy-enhanced matchmaking with identity linked wishes 舞会问题:公平和隐私增强配对与身份相关的愿望
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815691
Dwight Home, S. Nair
In this paper we present the Prom Problem (TPP) which exemplifies a special class of matchmaking challenges. We introduce the notion of identity linked wishes - wishes that involve specific identities and are valid if and only if all involved parties have that wish. A number of protocols over the years have highlighted the conflicting goals of anonymity and authentication in attempting to match users with common wishes. More recent works have built upon past attempts proposing solutions for private and privacy-enhanced matchmaking with additional security goals. Yet those protocols are insufficient in the context of TPP due primarily to the lack of fairness and inability to ensure security and privacy. We describe TPP in detail, compare with prior work, and propose a fair and privacy-enhanced matchmaking protocol supporting identity linked wishes with an untrusted matchmaker. In practical terms, our technology can prevent much of the potential damage from data breaches similar to the recent Ashley Madison hack which has allegedly resulted in blackmail, ruined careers, espionage, and even suicide. We give a pseudo-code example of our solution along with its security and preliminary performance evaluation.
在本文中,我们提出了舞会问题(TPP),它是一类特殊的配对挑战的例子。我们引入了身份关联愿望的概念,即涉及特定身份的愿望,当且仅当所有相关方都有这种愿望时才有效。多年来,许多协议都强调了匿名和身份验证的冲突目标,试图将用户与共同的愿望相匹配。最近的工作建立在过去的尝试之上,提出了带有额外安全目标的私人和增强隐私的配对解决方案。然而,这些协议在TPP的背景下是不够的,主要原因是缺乏公平性,无法确保安全和隐私。我们详细描述了TPP,与之前的工作进行了比较,并提出了一个公平和隐私增强的配对协议,支持与不受信任的媒人进行身份链接的愿望。实际上,我们的技术可以防止数据泄露带来的潜在损害,比如最近阿什利·麦迪逊(Ashley Madison)被黑客入侵,据称该事件导致了勒索、毁了职业、间谍活动,甚至自杀。我们给出了我们的解决方案的伪代码示例,以及它的安全性和初步性能评估。
{"title":"The Prom Problem: Fair and privacy-enhanced matchmaking with identity linked wishes","authors":"Dwight Home, S. Nair","doi":"10.1109/CCST.2016.7815691","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815691","url":null,"abstract":"In this paper we present the Prom Problem (TPP) which exemplifies a special class of matchmaking challenges. We introduce the notion of identity linked wishes - wishes that involve specific identities and are valid if and only if all involved parties have that wish. A number of protocols over the years have highlighted the conflicting goals of anonymity and authentication in attempting to match users with common wishes. More recent works have built upon past attempts proposing solutions for private and privacy-enhanced matchmaking with additional security goals. Yet those protocols are insufficient in the context of TPP due primarily to the lack of fairness and inability to ensure security and privacy. We describe TPP in detail, compare with prior work, and propose a fair and privacy-enhanced matchmaking protocol supporting identity linked wishes with an untrusted matchmaker. In practical terms, our technology can prevent much of the potential damage from data breaches similar to the recent Ashley Madison hack which has allegedly resulted in blackmail, ruined careers, espionage, and even suicide. We give a pseudo-code example of our solution along with its security and preliminary performance evaluation.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"11 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90427316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes 利用身份属性生态系统预测和解释身份风险、暴露和成本
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815701
Razieh Nokhbeh Zaeem, S. Budalakoti, K. Suzanne Barber, Muhibur Rasheed, C. Bajaj
Personally Identifiable Information (PII) is commonly used in both the physical and cyber worlds to perform personal authentication. A 2014 Department of Justice report estimated that roughly 7% of American households reported some type of identity theft in the previous year, involving the theft and fraudulent use of such PII. Establishing a comprehensive map of PII attributes and their relationships is a fundamental first step to protect users from identity theft. In this paper, we present the mathematical representation and implementation of a model of Personally Identifiable Information attributes for people, named Identity Ecosystem. Each PII attribute (e.g., name, age, and Social Security Number) is modeled as a graph node. Probabilistic relationships between PII attributes are modeled as graph edges. We have implemented this Identity Ecosystem model as a Bayesian Belief Network (with cycles allowed) and we use Gibb's Sampling to approximate the posteriors in our model. We populated the model from two sources of information: 1) actual theft and fraud cases; and 2) experts' estimates. We have utilized our Identity Ecosystem implementation to predict as well as to explain the risk of losing PII and the liability associated with fraudulent use of these PII attributes. For better human understanding of the complex identity ecosystem, we also provide a 3D visualization of the Identity Ecosystem model and queries executed on the model. This research aims to advance a fundamental understanding of PII attributes and leads to better methods for preventing identity theft and fraud.
个人身份信息(PII)通常用于物理和网络世界中执行个人身份验证。美国司法部(Department of Justice) 2014年的一份报告估计,大约7%的美国家庭在前一年报告了某种形式的身份盗窃,包括盗窃和欺诈性使用此类个人身份信息。建立PII属性及其关系的全面映射是保护用户免遭身份盗用的基本第一步。在本文中,我们提出了一个名为身份生态系统的个人可识别信息属性模型的数学表示和实现。每个PII属性(例如,姓名、年龄和社会安全号码)都被建模为一个图节点。PII属性之间的概率关系被建模为图边。我们将这个身份生态系统模型实现为贝叶斯信念网络(允许循环),并使用Gibb抽样来近似模型中的后验。我们从两个信息来源填充模型:1)实际的盗窃和欺诈案件;2)专家的估计。我们已经利用我们的身份生态系统实现来预测和解释丢失PII的风险以及与欺诈性使用这些PII属性相关的责任。为了更好地理解复杂的身份生态系统,我们还提供了身份生态系统模型的3D可视化和在模型上执行的查询。本研究旨在促进对个人身份信息属性的基本理解,并为防止身份盗窃和欺诈提供更好的方法。
{"title":"Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes","authors":"Razieh Nokhbeh Zaeem, S. Budalakoti, K. Suzanne Barber, Muhibur Rasheed, C. Bajaj","doi":"10.1109/CCST.2016.7815701","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815701","url":null,"abstract":"Personally Identifiable Information (PII) is commonly used in both the physical and cyber worlds to perform personal authentication. A 2014 Department of Justice report estimated that roughly 7% of American households reported some type of identity theft in the previous year, involving the theft and fraudulent use of such PII. Establishing a comprehensive map of PII attributes and their relationships is a fundamental first step to protect users from identity theft. In this paper, we present the mathematical representation and implementation of a model of Personally Identifiable Information attributes for people, named Identity Ecosystem. Each PII attribute (e.g., name, age, and Social Security Number) is modeled as a graph node. Probabilistic relationships between PII attributes are modeled as graph edges. We have implemented this Identity Ecosystem model as a Bayesian Belief Network (with cycles allowed) and we use Gibb's Sampling to approximate the posteriors in our model. We populated the model from two sources of information: 1) actual theft and fraud cases; and 2) experts' estimates. We have utilized our Identity Ecosystem implementation to predict as well as to explain the risk of losing PII and the liability associated with fraudulent use of these PII attributes. For better human understanding of the complex identity ecosystem, we also provide a 3D visualization of the Identity Ecosystem model and queries executed on the model. This research aims to advance a fundamental understanding of PII attributes and leads to better methods for preventing identity theft and fraud.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"75 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85719575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
MTD assessment framework with cyber attack modeling 具有网络攻击建模的MTD评估框架
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815722
B. V. Leeuwen, W. Stout, V. Urias
Moving Target Defense (MTD) has received significant focus in technical publications. The publications describe MTD approaches that periodically change some attribute of the computer network system. The attribute that is changed, in most cases, is one that an adversary attempts to gain knowledge of through reconnaissance and may use its knowledge of the attribute to exploit the system. The fundamental mechanism an MTD uses to secure the system is to change the system attributes such that the adversary never gains the knowledge and cannot execute an exploit prior to the attribute changing value. Thus, the MTD keeps the adversary from gaining the knowledge of attributes necessary to exploit the system. Most papers conduct theoretical analysis or basic simulations to assess the effectiveness of the MTD approach. More effective assessment of MTD approaches should include behavioral characteristics for both the defensive actor and the adversary; however, limited research exists on running actual attacks against an implemented system with the objective of determining the security benefits and total cost of deploying the MTD approach. This paper explores empirical assessment through experimentation of MTD approaches. The cyber-kill chain is used to characterize the actions of the adversary and identify what classes of attacks were successfully thwarted by the MTD approach and what classes of attacks could not be thwarted In this research paper, we identify the experiment environments and where experiment fidelity should be focused to evaluate the effectiveness of MTD approaches. Additionally, experimentation environments that support contemporary technologies used in MTD approaches, such as software defined networking (SDN), are also identified and discussed.
移动目标防御(MTD)在技术出版物中受到了极大的关注。这些出版物描述了MTD方法周期性地改变计算机网络系统的某些属性。在大多数情况下,被更改的属性是攻击者试图通过侦察获得知识的属性,并可能利用其对该属性的了解来利用系统。MTD用于保护系统的基本机制是更改系统属性,这样攻击者永远不会获得知识,也无法在属性更改值之前执行漏洞利用。因此,MTD使攻击者无法获得利用系统所必需的属性知识。大多数论文通过理论分析或基本模拟来评估MTD方法的有效性。对MTD方法更有效的评估应该包括防御行为者和对手的行为特征;然而,针对已实现的系统运行实际攻击,以确定部署MTD方法的安全收益和总成本的研究有限。本文通过MTD方法的实验探讨了实证评估。网络杀伤链用于表征对手的行动,并确定哪些类别的攻击被MTD方法成功挫败,哪些类别的攻击无法被挫败。在本研究论文中,我们确定了实验环境,以及应该关注实验保真度的地方,以评估MTD方法的有效性。此外,还确定并讨论了支持MTD方法中使用的现代技术的实验环境,例如软件定义网络(SDN)。
{"title":"MTD assessment framework with cyber attack modeling","authors":"B. V. Leeuwen, W. Stout, V. Urias","doi":"10.1109/CCST.2016.7815722","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815722","url":null,"abstract":"Moving Target Defense (MTD) has received significant focus in technical publications. The publications describe MTD approaches that periodically change some attribute of the computer network system. The attribute that is changed, in most cases, is one that an adversary attempts to gain knowledge of through reconnaissance and may use its knowledge of the attribute to exploit the system. The fundamental mechanism an MTD uses to secure the system is to change the system attributes such that the adversary never gains the knowledge and cannot execute an exploit prior to the attribute changing value. Thus, the MTD keeps the adversary from gaining the knowledge of attributes necessary to exploit the system. Most papers conduct theoretical analysis or basic simulations to assess the effectiveness of the MTD approach. More effective assessment of MTD approaches should include behavioral characteristics for both the defensive actor and the adversary; however, limited research exists on running actual attacks against an implemented system with the objective of determining the security benefits and total cost of deploying the MTD approach. This paper explores empirical assessment through experimentation of MTD approaches. The cyber-kill chain is used to characterize the actions of the adversary and identify what classes of attacks were successfully thwarted by the MTD approach and what classes of attacks could not be thwarted In this research paper, we identify the experiment environments and where experiment fidelity should be focused to evaluate the effectiveness of MTD approaches. Additionally, experimentation environments that support contemporary technologies used in MTD approaches, such as software defined networking (SDN), are also identified and discussed.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"55 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89819756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Mission success: Assured communications and agile organizations 任务成功:确保沟通和敏捷组织
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815687
M. Vassiliou, D. Alberts, S. Shah
Success in complex missions, whether in the civilian, military, or mixed sectors, depends on agile organizations adapting their enterprise approaches to suit the purposes and circumstances at hand, and being able and willing to communicate necessary information. Case studies of complex endeavors in theaters including warfare, terrorism, and response to natural disasters have shown that communication failures are a very significant cause of adverse consequences, often including overall mission failure. Communication failures can be behavioral ones, exacerbated by inappropriate organizational choices. They can also arise from shortfalls in system design and technology. Enterprise approaches that are decentralized and network-enabled to varying degrees have differing propensities to communicate necessary information in diverse circumstances. They also have a complex and varying interplay with the enterprise's information and communications technology, and varying resilience to communications disruption. While more agile organizations can make up for communications shortfalls to an extent, there is no substituted for assured communications capabilities. In this connection, the ability to communicate relatively small amounts of information reliably can be much more important than the ability to transmit large multimedia files with high throughput. Important facets of assured communications systems include agility with respect to channel and spectrum, protection from attack and tampering, resilience in the face of disruptions, and interoperability. In some cases the goals can be achieved with appropriate policy, and in others with new technology development.
无论是在民用、军事还是混合领域,复杂任务的成功取决于敏捷组织调整其企业方法以适应手头的目的和环境,并且能够并且愿意沟通必要的信息。包括战争、恐怖主义和对自然灾害的响应在内的战区复杂努力的案例研究表明,通信故障是造成不利后果的一个非常重要的原因,通常包括整体任务失败。沟通失败可能是行为上的,不恰当的组织选择会加剧沟通失败。它们也可能源于系统设计和技术上的不足。分散的和在不同程度上支持网络的企业方法在不同情况下具有不同的通信必要信息的倾向。它们还与企业的信息和通信技术具有复杂和不同的相互作用,并且对通信中断具有不同的弹性。虽然更敏捷的组织可以在一定程度上弥补通信不足,但没有什么可以替代有保证的通信能力。在这方面,可靠地通信相对少量信息的能力可能比以高吞吐量传输大型多媒体文件的能力重要得多。可靠通信系统的重要方面包括通道和频谱方面的敏捷性、防止攻击和篡改、面对中断时的弹性以及互操作性。在某些情况下,这些目标可以通过适当的政策来实现,而在其他情况下,则可以通过开发新技术来实现。
{"title":"Mission success: Assured communications and agile organizations","authors":"M. Vassiliou, D. Alberts, S. Shah","doi":"10.1109/CCST.2016.7815687","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815687","url":null,"abstract":"Success in complex missions, whether in the civilian, military, or mixed sectors, depends on agile organizations adapting their enterprise approaches to suit the purposes and circumstances at hand, and being able and willing to communicate necessary information. Case studies of complex endeavors in theaters including warfare, terrorism, and response to natural disasters have shown that communication failures are a very significant cause of adverse consequences, often including overall mission failure. Communication failures can be behavioral ones, exacerbated by inappropriate organizational choices. They can also arise from shortfalls in system design and technology. Enterprise approaches that are decentralized and network-enabled to varying degrees have differing propensities to communicate necessary information in diverse circumstances. They also have a complex and varying interplay with the enterprise's information and communications technology, and varying resilience to communications disruption. While more agile organizations can make up for communications shortfalls to an extent, there is no substituted for assured communications capabilities. In this connection, the ability to communicate relatively small amounts of information reliably can be much more important than the ability to transmit large multimedia files with high throughput. Important facets of assured communications systems include agility with respect to channel and spectrum, protection from attack and tampering, resilience in the face of disruptions, and interoperability. In some cases the goals can be achieved with appropriate policy, and in others with new technology development.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"65 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88681129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptographic library performance comparison for instant messaging system centralized data 用于即时消息系统集中数据的加密库性能比较
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815704
R. C. Logreira, Z. J. Florez, Mario Muñoz
The explosion in mobile communication use in our lives has led to a new method for information exchange between people. Therefore, there are now plenty of instant messaging applications, which have a single purpose that is done through different methods. Thus, methods and information exchange protocols play an important role in reducing processing times, low battery consumption and low bandwidth consumption. This article shows the comparison in time performance of an instant messager server through two open source cryptographic library implementations, using two asymmetric cryptographic processes in a centralized messaging system in order to seek confidentiality, integrity and authenticity of the messages. Cryptographic schemes used are Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA). In addition, it determines which library is more efficient to implement in that server.
移动通信在我们生活中的爆炸式增长为人与人之间的信息交换带来了一种新的方式。因此,现在有大量的即时消息应用程序,它们通过不同的方法实现单一的目的。因此,方法和信息交换协议在减少处理时间、低电池消耗和低带宽消耗方面发挥着重要作用。本文通过两个开源加密库实现来比较即时消息服务器的时间性能,在集中式消息传递系统中使用两个非对称加密过程,以寻求消息的机密性、完整性和真实性。使用的加密方案有椭圆曲线Diffie-Hellman (ECDH)和椭圆曲线数字签名算法ECDSA。此外,它还决定在该服务器中实现哪个库更有效。
{"title":"Cryptographic library performance comparison for instant messaging system centralized data","authors":"R. C. Logreira, Z. J. Florez, Mario Muñoz","doi":"10.1109/CCST.2016.7815704","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815704","url":null,"abstract":"The explosion in mobile communication use in our lives has led to a new method for information exchange between people. Therefore, there are now plenty of instant messaging applications, which have a single purpose that is done through different methods. Thus, methods and information exchange protocols play an important role in reducing processing times, low battery consumption and low bandwidth consumption. This article shows the comparison in time performance of an instant messager server through two open source cryptographic library implementations, using two asymmetric cryptographic processes in a centralized messaging system in order to seek confidentiality, integrity and authenticity of the messages. Cryptographic schemes used are Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA). In addition, it determines which library is more efficient to implement in that server.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"144 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85386271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative analysis on the performance of static handwritten verification systems on realistic scenarios 静态手写验证系统在现实场景下的性能对比分析
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815679
Rodrigo Ros-Gomez, Helga C. Quiros-Sandoval, Ramón Blanco-Gonzalo, R. Sánchez-Reillo
An analysis on realistic conditions for static handwritten signature verification systems is presented. Evaluation conditions are studied so to approximate as accurately as possible the conditions of a real-world operational scenario. Also, the problem of modeling realistic attacks by using databases containing forgeries is considered in the analysis. To do so, a database collected with different levels of knowledge and training is used. Performance evaluation results with these restrictions are given over several databases. Results show the effect of the amount of training and the information available to the forger on the attack resistance of some algorithms.
对静态手写签名验证系统的现实条件进行了分析。对评估条件进行了研究,以便尽可能准确地近似真实操作场景的条件。此外,分析中还考虑了使用包含伪造文件的数据库对真实攻击进行建模的问题。为此,使用了一个收集了不同水平的知识和培训的数据库。给出了基于这些限制的多个数据库的性能评估结果。结果显示了训练量和伪造者可获得的信息对某些算法的抗攻击能力的影响。
{"title":"A comparative analysis on the performance of static handwritten verification systems on realistic scenarios","authors":"Rodrigo Ros-Gomez, Helga C. Quiros-Sandoval, Ramón Blanco-Gonzalo, R. Sánchez-Reillo","doi":"10.1109/CCST.2016.7815679","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815679","url":null,"abstract":"An analysis on realistic conditions for static handwritten signature verification systems is presented. Evaluation conditions are studied so to approximate as accurately as possible the conditions of a real-world operational scenario. Also, the problem of modeling realistic attacks by using databases containing forgeries is considered in the analysis. To do so, a database collected with different levels of knowledge and training is used. Performance evaluation results with these restrictions are given over several databases. Results show the effect of the amount of training and the information available to the forger on the attack resistance of some algorithms.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"61 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84677197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges to securing the Internet of Things 物联网安全面临的挑战
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815675
W. Stout, V. Urias
Great advances in technology have paved the way for the computerization and interconnectedness of the world around us. The Internet of Things (IoT) describes a network comprised of physical objects or “things” embedded with electronics, software, sensors and connectivity to achieve greater value and service by exchanging data with manufacturers, users, and/or other connected devices. However, it is often the case that some of these devices are constrained by limited processing power, memory, and power consumption. These limitations may enable adverse effects as the IoT becomes pervasive, reaching into infrastructure, vehicles, and homes. As history has shown, the architects of the Internet were focused primarily on the efficiency and scaling aspects of data transfer protocols; at the dawn of the Internet, network and computer security were vacant research areas. The current trend shows the IoT market growing at an accelerated rate - will security again become an afterthought? The goal of this paper is to provide to not only a better understanding of the various IoT domains, but to survey the shortcomings and challenges to securing IoT devices and their interactions with cloud and enterprise applications.
科技的巨大进步为我们周围世界的计算机化和互联化铺平了道路。物联网(IoT)描述了一个由嵌入电子、软件、传感器和连接的物理对象或“事物”组成的网络,通过与制造商、用户和/或其他连接设备交换数据来实现更大的价值和服务。然而,通常情况下,这些设备中的一些受到有限的处理能力、内存和功耗的限制。随着物联网的普及,这些限制可能会产生不利影响,渗透到基础设施、车辆和家庭中。正如历史所示,互联网的架构师主要关注数据传输协议的效率和可扩展性方面;在互联网诞生之初,网络和计算机安全是空白的研究领域。目前的趋势显示物联网市场正在加速增长——安全是否会再次成为事后的考虑?本文的目标不仅是提供对各种物联网领域的更好理解,而且还调查了保护物联网设备及其与云和企业应用程序交互的缺点和挑战。
{"title":"Challenges to securing the Internet of Things","authors":"W. Stout, V. Urias","doi":"10.1109/CCST.2016.7815675","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815675","url":null,"abstract":"Great advances in technology have paved the way for the computerization and interconnectedness of the world around us. The Internet of Things (IoT) describes a network comprised of physical objects or “things” embedded with electronics, software, sensors and connectivity to achieve greater value and service by exchanging data with manufacturers, users, and/or other connected devices. However, it is often the case that some of these devices are constrained by limited processing power, memory, and power consumption. These limitations may enable adverse effects as the IoT becomes pervasive, reaching into infrastructure, vehicles, and homes. As history has shown, the architects of the Internet were focused primarily on the efficiency and scaling aspects of data transfer protocols; at the dawn of the Internet, network and computer security were vacant research areas. The current trend shows the IoT market growing at an accelerated rate - will security again become an afterthought? The goal of this paper is to provide to not only a better understanding of the various IoT domains, but to survey the shortcomings and challenges to securing IoT devices and their interactions with cloud and enterprise applications.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"79 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75155393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Detection of UAV hijacking and malfunctions via variations in flight data statistics 通过飞行数据统计的变化检测无人机劫持和故障
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815713
Jason McNeely, M. Hatfield, Abir Hasan, Nusrat Jahan
Detection of potential hijackings of Unmanned Aerial Vehicles (UAVs) is an important capability to have for the safety of the future airspace and prevention of loss of life and property. In this paper, we propose using basic statistical measures as a fingerprint to flight patterns that can be checked against previous flights. We generated baseline flights and then simulated hijacking scenarios to determine the extent of the feasibility of this method. Our results indicated that all of the direct hijacking scenarios were detected, but flights with control instability caused by malicious acts were not detected.
探测潜在的无人机劫持是未来空域安全和防止生命财产损失的重要能力。在本文中,我们建议使用基本的统计措施作为飞行模式的指纹,可以对照以前的航班进行检查。我们生成基线飞行,然后模拟劫持场景,以确定该方法的可行性程度。我们的研究结果表明,所有的直接劫持场景都被检测到,但由于恶意行为导致的控制不稳定的航班没有被检测到。
{"title":"Detection of UAV hijacking and malfunctions via variations in flight data statistics","authors":"Jason McNeely, M. Hatfield, Abir Hasan, Nusrat Jahan","doi":"10.1109/CCST.2016.7815713","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815713","url":null,"abstract":"Detection of potential hijackings of Unmanned Aerial Vehicles (UAVs) is an important capability to have for the safety of the future airspace and prevention of loss of life and property. In this paper, we propose using basic statistical measures as a fingerprint to flight patterns that can be checked against previous flights. We generated baseline flights and then simulated hijacking scenarios to determine the extent of the feasibility of this method. Our results indicated that all of the direct hijacking scenarios were detected, but flights with control instability caused by malicious acts were not detected.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"38 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76401034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Automated comparison of X-ray images for cargo scanning 货物扫描的x射线图像自动比较
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815714
Wicher Visser, A. Schwaninger, D. Hardmeier, A. Flisch, M. Costin, C. Vienne, F. Sukowski, U. Hassler, I. Dorion, Abraham Marciano, G. Koomen, M. Slegt, Andrea Canonica
Customs administrations are responsible for the enforcement of fiscal integrity and security of movements of goods across land and sea borders. In order to verify whether the transported goods match the transport declaration, X-ray imaging of containers is used at many customs site worldwide. The main objective of the research and development project “Automated Comparison of X-ray Images for Cargo Scanning (ACXIS)”, which is funded by the European 7th Framework Program, is to improve the efficiency and effectiveness of the inspection procedures of cargo at customs using X-ray technology. The current inspection procedures are reviewed to identify risks, catalogue illegal cargo, and prioritize detection scenarios. Based on these results, we propose an integrated solution that provides automation, information exchange between customs administrations, and computer-based training modules for customs officers. Automated target recognition (ATR) functions analyze the X-ray image after a scan is made to detect certain types of goods such as cigarettes, weapons and drugs in the freight or container. Other helpful information can also be provided, such as the load homogeneity, total or partial weight, or the number of similar items. The ATR functions are provided as an option to the user. The X-ray image is transformed into a manufacturer-independent format through geometrical and spectral corrections and stored into a database along with the user feedback and other related data. This information can be exchanged with similar systems at other sites, thus facilitating information exchange between customs administrations. The database is seeded with over 30'000 examples of legitimate and illegal goods. These examples are used by the ATR functions through machine learning techniques, which are further strengthened by the information exchange. In order to improve X-ray image interpretation competency of human operators (customs officers), a computer-based training software is developed that simulates these new inspection procedures. A study is carried out to validate the effectiveness and efficiency of the computer-based training as well as the implemented procedures. Officers from the Dutch and Swiss Customs administrations partake in the study, covering both land and sea borders.
海关管理部门负责执行财政诚信和货物跨境和海上流动的安全。为了核实运输货物是否与运输申报相符,全球许多海关都使用集装箱x射线成像技术。由欧洲第7框架计划资助的“货物扫描x射线图像自动比较”研究和发展项目的主要目的是提高海关使用x射线技术检查货物程序的效率和效果。审查现行的检查程序,以识别风险,对非法货物进行分类,并优先考虑检测方案。根据这些结果,我们提出了一个综合解决方案,提供自动化、海关管理部门之间的信息交换和海关人员的计算机培训模块。自动目标识别(ATR)功能分析扫描后的x射线图像,以检测货物或集装箱中的香烟、武器、毒品等特定类型的货物。还可以提供其他有用的信息,例如负载均匀性、总重量或部分重量或类似项目的数量。ATR功能作为选项提供给用户。通过几何和光谱校正,将x射线图像转换为与制造商无关的格式,并与用户反馈和其他相关数据一起存储到数据库中。这些资料可与其他地点的类似系统交换,从而促进海关当局之间的资料交换。该数据库包含超过3万个合法和非法商品的例子。这些例子通过机器学习技术被ATR函数使用,并通过信息交换进一步加强。为了提高人工操作员(海关人员)解读x光图像的能力,海关开发了一套模拟这些新检查程序的电脑培训软件。进行了一项研究,以验证以计算机为基础的培训的有效性和效率以及所实施的程序。来自荷兰和瑞士海关的官员参与了这项研究,涵盖了陆地和海上边界。
{"title":"Automated comparison of X-ray images for cargo scanning","authors":"Wicher Visser, A. Schwaninger, D. Hardmeier, A. Flisch, M. Costin, C. Vienne, F. Sukowski, U. Hassler, I. Dorion, Abraham Marciano, G. Koomen, M. Slegt, Andrea Canonica","doi":"10.1109/CCST.2016.7815714","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815714","url":null,"abstract":"Customs administrations are responsible for the enforcement of fiscal integrity and security of movements of goods across land and sea borders. In order to verify whether the transported goods match the transport declaration, X-ray imaging of containers is used at many customs site worldwide. The main objective of the research and development project “Automated Comparison of X-ray Images for Cargo Scanning (ACXIS)”, which is funded by the European 7th Framework Program, is to improve the efficiency and effectiveness of the inspection procedures of cargo at customs using X-ray technology. The current inspection procedures are reviewed to identify risks, catalogue illegal cargo, and prioritize detection scenarios. Based on these results, we propose an integrated solution that provides automation, information exchange between customs administrations, and computer-based training modules for customs officers. Automated target recognition (ATR) functions analyze the X-ray image after a scan is made to detect certain types of goods such as cigarettes, weapons and drugs in the freight or container. Other helpful information can also be provided, such as the load homogeneity, total or partial weight, or the number of similar items. The ATR functions are provided as an option to the user. The X-ray image is transformed into a manufacturer-independent format through geometrical and spectral corrections and stored into a database along with the user feedback and other related data. This information can be exchanged with similar systems at other sites, thus facilitating information exchange between customs administrations. The database is seeded with over 30'000 examples of legitimate and illegal goods. These examples are used by the ATR functions through machine learning techniques, which are further strengthened by the information exchange. In order to improve X-ray image interpretation competency of human operators (customs officers), a computer-based training software is developed that simulates these new inspection procedures. A study is carried out to validate the effectiveness and efficiency of the computer-based training as well as the implemented procedures. Officers from the Dutch and Swiss Customs administrations partake in the study, covering both land and sea borders.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"5 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90191688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2016 IEEE International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1